7: Flags (3:app, 2:system, env, root
)
1: Service
6,200 pts
Avg. headshot: 44,823 minutes
7: Flags found
1: Service discovered
3,150 pts
30,666 minutes
A system in honor of the NCSA web server, full of its original Common Gateway Interface utilities.
Needless to say these are old, just like one of the multiple ways you can gain access to this system. Escalation needs no actual programming experience, but you have to know how a unix system tries to find the commands you run.
Try not to get to hurt the target too much, you dont want to make its bleed its heart out.
Activity Stream
Latest activity on the platform
l4dyr00t Gained access to data stored in environmental variables of
legacy
for 450 points, 41 months ago
l4dyr00t Discovered a flag on a cgi script of a target that shows how long the system is up for 250 points, 41 months ago
l4dyr00t Discovered a flag on a target web service for 50 points, 41 months ago
l4dyr00t Discovered the ETSCTF username flag under the shadow file of
legacy
for 650 points, 41 months ago
l4dyr00t Got the ETSCTF username flag from the /etc/passwd file of a server for 650 points, 42 months ago
l4dyr00t Discovered a flag cgi on a target service for 250 points, 42 months ago
l4dyr00t Discovered a service on a target host for 100 points, 42 months ago